SlideShare a Scribd company logo
1 of 19
Download to read offline
Pa#ern 
Recogni-on 
and 
Applica-ons 
Lab 
Poisoning Behavioral Malware Clustering 
University 
of 
Cagliari, 
Italy 
Department 
of 
Electrical 
and 
Electronic 
Engineering 
Ba#sta 
Biggio1, 
Konrad 
Rieck2, 
Davide 
Ariu1, 
Chris-an 
Wressnegger2, 
Igino 
Corona1, 
Giorgio 
Giacinto1, 
and 
Fabio 
Roli1 
(1) 
University 
of 
Cagliari 
(IT) 
(2) 
University 
of 
GoeLngen 
(GE) 
Sco#sdale, 
Arizona, 
AISec 
2014 
US, 
Nov., 
7 
2014
Threats and Attacks in Computer Security 
• Huge number of devices, services and apps on the Internet 
– Vulnerabilities in code, services, apps, etc. 
• Attacks through malicious software (malware) 
– Botnets, spam, identity theft / stolen credit card numbers 
• Manual analysis and crafting of signatures costly 
– Need for automated / assisted detection (and rule generation) 
– Machine learning-based defenses (data clustering) 
http://pralab.diee.unica.it 
2 
Evasion: malware families / variants 
+65% new malware variants from 2012 to 2013 
Mobile Adware & Malw. Analysis, Symantec, 2014 
Detection: antivirus systems 
Rule-based systems
Data Clustering for Computer Security 
• Goal: clustering of malware families to identify common 
characteristics and design suitable countermeasures 
• e.g., antivirus rules / signatures 
http://pralab.diee.unica.it 
3 
xx 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x1 
x2 
... 
xd 
feature extraction 
(e.g., executed 
instructions, 
system calls, etc.) 
clustering of 
malware families 
(e.g., similar program 
behavior) 
for 
each 
cluster 
if 
… 
then 
… 
else 
… 
data analysis / 
countermeasure design 
(e.g., signature generation) 
data collection 
(honeypots) 
Malware samples
Is Data Clustering Secure? 
• Attackers can poison input data to subvert malware clustering 
http://pralab.diee.unica.it 
4 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x1 
x2 
... 
xd 
feature extraction 
(e.g., executed 
instructions, 
system calls, etc.) 
Malware samples designed 
to subvert clustering 
… is significantly 
compromised 
for 
each 
cluster 
if 
… 
then 
… 
else 
… 
… becomes 
useless (too many 
false alarms, low 
detection rate) 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014 
data collection 
(honeypots) 
clustering of 
malware families 
(e.g., similar program 
behavior) 
data analysis / 
countermeasure design 
(e.g., signature generation)
Is Data Clustering Secure? 
• Our previous work (1,2): 
– Framework for security evaluation of clustering algorithms 
– Formalization of poisoning attacks (optimization) against 
single- and complete-linkage hierarchical clustering 
• In this work we focus on a realistic application example on 
http://pralab.diee.unica.it 
5 
Poisoning 
a,acks 
against 
a 
behavioral 
malware 
clustering 
approach 
(3) 
Malheur 
h,p://www.mlsec.org/malheur/ 
(1) B. Biggio et al.. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering. In S+SSPR 2014 
(3) K. Rieck et al.. Automatic analysis of malware behavior using machine learning. JCS 2011
Poisoning Attacks 
• Goal: to maximally compromise the clustering output on D 
• Capability: adding m attack samples 
• Knowledge: perfect / worst-case attack 
• Attack strategy: 
x 
http://pralab.diee.unica.it 
6 
max 
A 
m 
dc (Y,Y!(A)), A= ai { }i=1 
Distance between the clustering in the absence of attack and that under attack 
Y! = fD(D∪A) 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
Attack samples A 
Y = f (D) 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
Clustering on untainted data D 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Poisoning Attacks 
dc (Y,Y!) = YY T −Y!Y!T 
http://pralab.diee.unica.it 
7 
F 
m 
, Y = 
%%%%%% & 
1 0 0 
0 0 1 
0 0 1 
1 0 0 
0 1 0 
# 
$ 
(((((( 
, YY T = 
' 
1 0 0 1 0 
0 1 1 0 0 
0 1 1 0 0 
1 0 0 1 0 
0 0 0 0 1 
# 
%%%%%% 
$ 
This distance counts how many pairs of samples have been clustered 
together in one clustering and not in the other, and vice-versa 
& 
(((((( 
' 
For a given clustering: 
Sample 1 
… 
Sample 5 
max 
A 
dc (Y,Y!(A)), A= ai { }i=1 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Single-Linkage Hierarchical Clustering 
• Bottom-up agglomerative clustering 
– each point is initially considered as a cluster 
– closest clusters are iteratively merged 
• Linkage criterion to define distance between clusters 
– single-linkage criterion 
x 
x 
• Clustering output is a hierarchy of clusterings 
– Criterion needed to select a given clustering (e.g., number of clusters) 
– Cutoff threshold on the maximum intra-cluster distance 
http://pralab.diee.unica.it 
8 
x 
dist(Ci,Cj ) = min 
a∈Ci , b∈Cj 
d(a, b) x 
x 
x 
x 
x 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Poisoning Single-Linkage Clustering 
• Attack strategy: 
• Heuristic-based solutions 
m 
– Greedy approach: adding one attack sample at a time 
– Bridge-based heuristics: local maxima are found in between the 
closest points of adjacent clusters 
http://pralab.diee.unica.it 
9 
max 
A 
dc (Y,Y!(A)), A= ai { }i=1 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Poisoning Single-Linkage Clustering 
http://pralab.diee.unica.it 
10 
• Underlying idea: bridging the closest clusters 
– Given K clusters, K-1 candidate attack points 
Candidate attack points 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Poisoning Single-Linkage Clustering 
1. Bridge (Best): evaluates Y’(a) for each candidate attack, 
retaining the best one 
– Clustering is run for each candidate attack point 
2. Bridge (Hard): estimates Y’(a) assuming that each candidate will 
split the corresponding cluster, potentially merging it with a 
fragment of the closest cluster 
– It does not require running clustering to find the best attack point 
3. Bridge (Soft): estimates Y’(a) as Bridge (Hard), but using a soft 
probabilistic estimate instead of 0/1 sample-to-cluster 
assignments 
– It does not require running clustering to find the best attack point 
http://pralab.diee.unica.it 
11 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Poisoning Single-Linkage Clustering 
• The attack compromises the initial clustering by forming 
heterogeneous clusters 
http://pralab.diee.unica.it 
12 
Clustering on untainted data 
2.5 
Clustering after adding 20 attack samples 
2 
1.5 
1 
0.5 
0 
−0.5 
−1 
−1.5 
−2 
−2.5 
−2 −1.5 −1 −0.5 0 0.5 1 1.5 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Malheur 
Behavioral Malware Clustering 
• Malware executed in a sandbox (e.g., virtual machine) 
– Monitoring of program behavior (instructions, system calls, etc.) 
• Embedding of malware behavior in feature space 
– Each feature denotes presence / absence of a given instruction 
– Each vector is normalized to unit Euclidean norm 
• Clustering using single-linkage (or other linkage variants) 
http://pralab.diee.unica.it 
13 
Filesystem 
copy file ‘a’ to ’b’ 
open file ’foo.txt’ 
Network 
ping host ’10.1.2.3’ 
listen on port ‘31337’ 
Registry 
set key ‘reboot’ to ‘1’ 
(level 1) 
14 
01 
| 
11 
04 
… 
02 
02 
| 
02 
02 
… 
0d 
01 
| 
03 
0a 
… 
03 
03 
| 
03 
01 
… 
03 
0a 
| 
11 
04 
… 
Sandbox 
MIST 
Instruction 
(opcode) 
arguments 
Feature space 
14 
01 
02 
02 
+ 
(1) K. Rieck et al.. Automatic analysis of malware behavior using machine learning. JCS 2011
Poisoning Malheur 
• Poisoning single-linkage hierarchical clustering 
• Problem: how to create bridge points in this feature space? 
– Binary-valued vectors normalized to unit Euclidean norm 
• Additional constraint on the manipulation of malware samples 
– Malware should be modified without affecting malicious functionality 
– Adding instructions after malware program execution 
– Feature values can be only incremented 
http://pralab.diee.unica.it 
14 
x1 = (1 1 0 0 0) 
x2 = (0 0 1 1 1) 
1.5 
1 
0.5 
0 
d(x,x 
) 
1 
d(x,x 
) 
2 
0 1 2 3 
number of added features 
x2 
14 
01 
02 
02 
+ 
+ 
+ 
Bridge point 
x1 
x x
Experimental Setup and Datasets 
• Setup 
– Data split into two portions of equal size T and S 
– T used for extracting instructions and setting the cutoff threshold 
– S used for performance evaluation 
– F-measure: agreement between clusters and malware families 
• Malheur data 
– 3131 malware samples collected in 2009 (publicly available) 
– 85 instructions / features (on average) 
– Cutoff distance (max. F-measure on T): 0.49 (on average) 
• Recent Malware data 
– 657 malware samples from most prominent families in 2013 
– 78 instructions / features (on average) 
– Cutoff distance (max. F-measure on T): 0.63 (on average) 
http://pralab.diee.unica.it 
15
Experimental Results (Malheur data) 
• Attack strategies 
– Bridge (Best/Hard/Soft), Random, Random (Best), F-measure (Best) 
• Results for Malheur data 
– Random-based attacks are not effective (high-dimensional space) 
– Bridging is effective / clusters are fused together (cutoff threshold is fixed) 
– F-measure decreases while maximizing distance between clusterings 
Random Random (Best) Bridge (Best) Bridge (Soft) Bridge (Hard) F−measure (Best) 
1600 
1400 
1200 
1000 
800 
600 
400 
200 
0 
http://pralab.diee.unica.it 
16 
100 
10 20 30 40 50 60 70 80 
0% 2% 5% 7% 9% 11%13%15%17%18%20% 
Objective function 
90 
80 
70 
60 
50 
40 
30 
20 
10 
0% 2% 5% 7% 9% 11% 13% 15% 17% 18% 20% 
F−measure 
Fraction of poisoning attacks
Experimental Results (Recent Malware data) 
• Attack strategies 
– Bridge (Best/Hard/Soft), Random, Random (Best), F-measure (Best) 
• Results for Recent Malware data 
– Random-based attacks are not effective (high-dimensional space) 
– Bridging is effective / clusters are fused together (cutoff threshold is fixed) 
– F-measure decreases while maximizing distance between clusterings 
Random Random (Best) Bridge (Best) Bridge (Soft) Bridge (Hard) F−measure (Best) 
300 
250 
200 
150 
100 
50 
0 
http://pralab.diee.unica.it 
17 
72 
10 20 30 40 50 60 70 80 
0% 2% 5% 7% 9% 11%13%15%16%18%20% 
Objective function 
70 
68 
66 
64 
62 
60 
58 
56 
54 
52 
0% 2% 5% 7% 9% 11%13%15%16%18%20% 
F−measure 
Fraction of poisoning attacks
Conclusions and Future Work 
• Poisoning attacks can subvert behavioral malware clustering 
• Future work 
– Extensions to other clustering algorithms, common attack strategy 
• e.g., black-box optimization with suitable heuristics 
– Attacks with limited knowledge of the data / clustering algorithm 
http://pralab.diee.unica.it 
18 
Secure clustering algorithms 
Attacks against clustering
http://pralab.diee.unica.it 
? 
19 
Thanks 
for 
your 
a#en-on! 
Any 
quesCons

More Related Content

What's hot

Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Pluribus One
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Pluribus One
 
Adversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam BhattacharyaAdversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam BhattacharyaRupam Bhattacharya
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresPluribus One
 
Research of adversarial example on a deep neural network
Research of adversarial example on a deep neural networkResearch of adversarial example on a deep neural network
Research of adversarial example on a deep neural networkNAVER Engineering
 
Universal Adversarial Perturbation
Universal Adversarial PerturbationUniversal Adversarial Perturbation
Universal Adversarial PerturbationHyunwoo Kim
 
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...Malachi Jones
 
Self-learning systems for cyber security
Self-learning systems for cyber securitySelf-learning systems for cyber security
Self-learning systems for cyber securityKim Hammar
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET Journal
 
VB2015 Malware Classification meets crowd-sourcing
VB2015 Malware Classification meets crowd-sourcingVB2015 Malware Classification meets crowd-sourcing
VB2015 Malware Classification meets crowd-sourcingJohn D. Park
 
Strata San Jose 2016 - Reduce False Positives in Security
Strata San Jose 2016 - Reduce False Positives in Security Strata San Jose 2016 - Reduce False Positives in Security
Strata San Jose 2016 - Reduce False Positives in Security Ram Shankar Siva Kumar
 
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...Kishor Datta Gupta
 
The evaluation for the defense of adversarial attacks
The evaluation for the defense of adversarial attacksThe evaluation for the defense of adversarial attacks
The evaluation for the defense of adversarial attacksSimossyi Funabashi
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningKuppusamy P
 
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Mahdi Hosseini Moghaddam
 

What's hot (15)

Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Adversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam BhattacharyaAdversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam Bhattacharya
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Research of adversarial example on a deep neural network
Research of adversarial example on a deep neural networkResearch of adversarial example on a deep neural network
Research of adversarial example on a deep neural network
 
Universal Adversarial Perturbation
Universal Adversarial PerturbationUniversal Adversarial Perturbation
Universal Adversarial Perturbation
 
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
 
Self-learning systems for cyber security
Self-learning systems for cyber securitySelf-learning systems for cyber security
Self-learning systems for cyber security
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
 
VB2015 Malware Classification meets crowd-sourcing
VB2015 Malware Classification meets crowd-sourcingVB2015 Malware Classification meets crowd-sourcing
VB2015 Malware Classification meets crowd-sourcing
 
Strata San Jose 2016 - Reduce False Positives in Security
Strata San Jose 2016 - Reduce False Positives in Security Strata San Jose 2016 - Reduce False Positives in Security
Strata San Jose 2016 - Reduce False Positives in Security
 
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
 
The evaluation for the defense of adversarial attacks
The evaluation for the defense of adversarial attacksThe evaluation for the defense of adversarial attacks
The evaluation for the defense of adversarial attacks
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine Learning
 
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...
 

Viewers also liked

Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Pluribus One
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Pluribus One
 
Making neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursionMaking neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursionKaty Lee
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great InfographicsSlideShare
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShareKapost
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareEmpowered Presentations
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation OptimizationOneupweb
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingContent Marketing Institute
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 

Viewers also liked (10)

Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
 
Making neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursionMaking neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursion
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

Similar to Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering

Survey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning ModelsSurvey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning ModelsIRJET Journal
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022Marcus Botacin
 
Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...IAESIJAI
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesThomas Zimmermann
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
A Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsA Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsIJERA Editor
 
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxSafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxjeffsrosalyn
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
 
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptxTOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptxNagarajusabhavath
 
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGY
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGYMALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGY
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGYIRJET Journal
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfANJUMOHANANU
 
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...Sameera Horawalavithana
 
Botnet detection using Wgans for security
Botnet detection using Wgans for securityBotnet detection using Wgans for security
Botnet detection using Wgans for securityssuser3f5a831
 
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Darshan Gorasiya
 

Similar to Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering (20)

Survey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning ModelsSurvey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning Models
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx
 
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
 
Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
A Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsA Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric Systems
 
ICoSTEC-PPT.pptx
ICoSTEC-PPT.pptxICoSTEC-PPT.pptx
ICoSTEC-PPT.pptx
 
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxSafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
20170412 om patri pres 153pdf
20170412 om patri pres 153pdf20170412 om patri pres 153pdf
20170412 om patri pres 153pdf
 
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptxTOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
 
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGY
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGYMALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGY
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGY
 
H1803025360
H1803025360H1803025360
H1803025360
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdf
 
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
 
J017446568
J017446568J017446568
J017446568
 
Botnet detection using Wgans for security
Botnet detection using Wgans for securityBotnet detection using Wgans for security
Botnet detection using Wgans for security
 
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
 

More from Pluribus One

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Pluribus One
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Pluribus One
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Pluribus One
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Pluribus One
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsPluribus One
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 PosterPluribus One
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterPluribus One
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisAriu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisPluribus One
 
Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Pluribus One
 
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Pluribus One
 

More from Pluribus One (17)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environments
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011
 
Ariu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisAriu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern Analysis
 
Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011
 
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
 
Wiamis2010 poster
Wiamis2010 posterWiamis2010 poster
Wiamis2010 poster
 

Recently uploaded

Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Recently uploaded (20)

Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering

  • 1. Pa#ern Recogni-on and Applica-ons Lab Poisoning Behavioral Malware Clustering University of Cagliari, Italy Department of Electrical and Electronic Engineering Ba#sta Biggio1, Konrad Rieck2, Davide Ariu1, Chris-an Wressnegger2, Igino Corona1, Giorgio Giacinto1, and Fabio Roli1 (1) University of Cagliari (IT) (2) University of GoeLngen (GE) Sco#sdale, Arizona, AISec 2014 US, Nov., 7 2014
  • 2. Threats and Attacks in Computer Security • Huge number of devices, services and apps on the Internet – Vulnerabilities in code, services, apps, etc. • Attacks through malicious software (malware) – Botnets, spam, identity theft / stolen credit card numbers • Manual analysis and crafting of signatures costly – Need for automated / assisted detection (and rule generation) – Machine learning-based defenses (data clustering) http://pralab.diee.unica.it 2 Evasion: malware families / variants +65% new malware variants from 2012 to 2013 Mobile Adware & Malw. Analysis, Symantec, 2014 Detection: antivirus systems Rule-based systems
  • 3. Data Clustering for Computer Security • Goal: clustering of malware families to identify common characteristics and design suitable countermeasures • e.g., antivirus rules / signatures http://pralab.diee.unica.it 3 xx x x x x x x x x x x x x x x x x1 x2 ... xd feature extraction (e.g., executed instructions, system calls, etc.) clustering of malware families (e.g., similar program behavior) for each cluster if … then … else … data analysis / countermeasure design (e.g., signature generation) data collection (honeypots) Malware samples
  • 4. Is Data Clustering Secure? • Attackers can poison input data to subvert malware clustering http://pralab.diee.unica.it 4 x x x x x x x x x x x x x x x x x x1 x2 ... xd feature extraction (e.g., executed instructions, system calls, etc.) Malware samples designed to subvert clustering … is significantly compromised for each cluster if … then … else … … becomes useless (too many false alarms, low detection rate) (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014 data collection (honeypots) clustering of malware families (e.g., similar program behavior) data analysis / countermeasure design (e.g., signature generation)
  • 5. Is Data Clustering Secure? • Our previous work (1,2): – Framework for security evaluation of clustering algorithms – Formalization of poisoning attacks (optimization) against single- and complete-linkage hierarchical clustering • In this work we focus on a realistic application example on http://pralab.diee.unica.it 5 Poisoning a,acks against a behavioral malware clustering approach (3) Malheur h,p://www.mlsec.org/malheur/ (1) B. Biggio et al.. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering. In S+SSPR 2014 (3) K. Rieck et al.. Automatic analysis of malware behavior using machine learning. JCS 2011
  • 6. Poisoning Attacks • Goal: to maximally compromise the clustering output on D • Capability: adding m attack samples • Knowledge: perfect / worst-case attack • Attack strategy: x http://pralab.diee.unica.it 6 max A m dc (Y,Y!(A)), A= ai { }i=1 Distance between the clustering in the absence of attack and that under attack Y! = fD(D∪A) x x x x x x x x x x x x x x x Attack samples A Y = f (D) x x x x x x x x x x x x Clustering on untainted data D (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 7. Poisoning Attacks dc (Y,Y!) = YY T −Y!Y!T http://pralab.diee.unica.it 7 F m , Y = %%%%%% & 1 0 0 0 0 1 0 0 1 1 0 0 0 1 0 # $ (((((( , YY T = ' 1 0 0 1 0 0 1 1 0 0 0 1 1 0 0 1 0 0 1 0 0 0 0 0 1 # %%%%%% $ This distance counts how many pairs of samples have been clustered together in one clustering and not in the other, and vice-versa & (((((( ' For a given clustering: Sample 1 … Sample 5 max A dc (Y,Y!(A)), A= ai { }i=1 (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 8. Single-Linkage Hierarchical Clustering • Bottom-up agglomerative clustering – each point is initially considered as a cluster – closest clusters are iteratively merged • Linkage criterion to define distance between clusters – single-linkage criterion x x • Clustering output is a hierarchy of clusterings – Criterion needed to select a given clustering (e.g., number of clusters) – Cutoff threshold on the maximum intra-cluster distance http://pralab.diee.unica.it 8 x dist(Ci,Cj ) = min a∈Ci , b∈Cj d(a, b) x x x x x (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 9. Poisoning Single-Linkage Clustering • Attack strategy: • Heuristic-based solutions m – Greedy approach: adding one attack sample at a time – Bridge-based heuristics: local maxima are found in between the closest points of adjacent clusters http://pralab.diee.unica.it 9 max A dc (Y,Y!(A)), A= ai { }i=1 (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 10. Poisoning Single-Linkage Clustering http://pralab.diee.unica.it 10 • Underlying idea: bridging the closest clusters – Given K clusters, K-1 candidate attack points Candidate attack points (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 11. Poisoning Single-Linkage Clustering 1. Bridge (Best): evaluates Y’(a) for each candidate attack, retaining the best one – Clustering is run for each candidate attack point 2. Bridge (Hard): estimates Y’(a) assuming that each candidate will split the corresponding cluster, potentially merging it with a fragment of the closest cluster – It does not require running clustering to find the best attack point 3. Bridge (Soft): estimates Y’(a) as Bridge (Hard), but using a soft probabilistic estimate instead of 0/1 sample-to-cluster assignments – It does not require running clustering to find the best attack point http://pralab.diee.unica.it 11 (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 12. Poisoning Single-Linkage Clustering • The attack compromises the initial clustering by forming heterogeneous clusters http://pralab.diee.unica.it 12 Clustering on untainted data 2.5 Clustering after adding 20 attack samples 2 1.5 1 0.5 0 −0.5 −1 −1.5 −2 −2.5 −2 −1.5 −1 −0.5 0 0.5 1 1.5 (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 13. Malheur Behavioral Malware Clustering • Malware executed in a sandbox (e.g., virtual machine) – Monitoring of program behavior (instructions, system calls, etc.) • Embedding of malware behavior in feature space – Each feature denotes presence / absence of a given instruction – Each vector is normalized to unit Euclidean norm • Clustering using single-linkage (or other linkage variants) http://pralab.diee.unica.it 13 Filesystem copy file ‘a’ to ’b’ open file ’foo.txt’ Network ping host ’10.1.2.3’ listen on port ‘31337’ Registry set key ‘reboot’ to ‘1’ (level 1) 14 01 | 11 04 … 02 02 | 02 02 … 0d 01 | 03 0a … 03 03 | 03 01 … 03 0a | 11 04 … Sandbox MIST Instruction (opcode) arguments Feature space 14 01 02 02 + (1) K. Rieck et al.. Automatic analysis of malware behavior using machine learning. JCS 2011
  • 14. Poisoning Malheur • Poisoning single-linkage hierarchical clustering • Problem: how to create bridge points in this feature space? – Binary-valued vectors normalized to unit Euclidean norm • Additional constraint on the manipulation of malware samples – Malware should be modified without affecting malicious functionality – Adding instructions after malware program execution – Feature values can be only incremented http://pralab.diee.unica.it 14 x1 = (1 1 0 0 0) x2 = (0 0 1 1 1) 1.5 1 0.5 0 d(x,x ) 1 d(x,x ) 2 0 1 2 3 number of added features x2 14 01 02 02 + + + Bridge point x1 x x
  • 15. Experimental Setup and Datasets • Setup – Data split into two portions of equal size T and S – T used for extracting instructions and setting the cutoff threshold – S used for performance evaluation – F-measure: agreement between clusters and malware families • Malheur data – 3131 malware samples collected in 2009 (publicly available) – 85 instructions / features (on average) – Cutoff distance (max. F-measure on T): 0.49 (on average) • Recent Malware data – 657 malware samples from most prominent families in 2013 – 78 instructions / features (on average) – Cutoff distance (max. F-measure on T): 0.63 (on average) http://pralab.diee.unica.it 15
  • 16. Experimental Results (Malheur data) • Attack strategies – Bridge (Best/Hard/Soft), Random, Random (Best), F-measure (Best) • Results for Malheur data – Random-based attacks are not effective (high-dimensional space) – Bridging is effective / clusters are fused together (cutoff threshold is fixed) – F-measure decreases while maximizing distance between clusterings Random Random (Best) Bridge (Best) Bridge (Soft) Bridge (Hard) F−measure (Best) 1600 1400 1200 1000 800 600 400 200 0 http://pralab.diee.unica.it 16 100 10 20 30 40 50 60 70 80 0% 2% 5% 7% 9% 11%13%15%17%18%20% Objective function 90 80 70 60 50 40 30 20 10 0% 2% 5% 7% 9% 11% 13% 15% 17% 18% 20% F−measure Fraction of poisoning attacks
  • 17. Experimental Results (Recent Malware data) • Attack strategies – Bridge (Best/Hard/Soft), Random, Random (Best), F-measure (Best) • Results for Recent Malware data – Random-based attacks are not effective (high-dimensional space) – Bridging is effective / clusters are fused together (cutoff threshold is fixed) – F-measure decreases while maximizing distance between clusterings Random Random (Best) Bridge (Best) Bridge (Soft) Bridge (Hard) F−measure (Best) 300 250 200 150 100 50 0 http://pralab.diee.unica.it 17 72 10 20 30 40 50 60 70 80 0% 2% 5% 7% 9% 11%13%15%16%18%20% Objective function 70 68 66 64 62 60 58 56 54 52 0% 2% 5% 7% 9% 11%13%15%16%18%20% F−measure Fraction of poisoning attacks
  • 18. Conclusions and Future Work • Poisoning attacks can subvert behavioral malware clustering • Future work – Extensions to other clustering algorithms, common attack strategy • e.g., black-box optimization with suitable heuristics – Attacks with limited knowledge of the data / clustering algorithm http://pralab.diee.unica.it 18 Secure clustering algorithms Attacks against clustering
  • 19. http://pralab.diee.unica.it ? 19 Thanks for your a#en-on! Any quesCons